Mata Kuliah
Mata Kuliah
Mata Kuliah
Mata Kuliah
Mata Kuliah
Mata Kuliah
Mata Kuliah
Mata Kuliah
Administrasi Jaringan
Administrasi Jaringan
Administrasi Jaringan
Administrasi Jaringan
Administrasi Jaringan
Administrasi Jaringan
Administrasi Jaringan
Administrasi Jaringan
Politeknik Elektronikan Negeri Surabaya
Politeknik Elektronikan Negeri Surabaya
Politeknik Elektronikan Negeri Surabaya
Politeknik Elektronikan Negeri Surabaya
Politeknik Elektronikan Negeri Surabaya
Politeknik Elektronikan Negeri Surabaya
Politeknik Elektronikan Negeri Surabaya
Politeknik Elektronikan Negeri Surabaya
►
►
!
!
"
#
$ %
&
"
#
$ %
&
INTERNET
FIREWALL ROUTER -GTWDMZ
PROXY (Squid ) All access to Internet must through Proxy
FIREWALL -IDS Linux bridge , iptables shorewall , snort , portsentry , acidlab CISCO Router
Using acl , block malware from outside
All Server in DMZ Manage using SSH , Secure Webmin
SQL Database (MySQL ) Access only from localhost (127.0.0.1)
Managable Switchs
Block unwanted user from port , manage from WEB
(
(
MULTILAYER
SWITCH E-MAIL %# $ ' )#$ # % ( % # #* FILESERVER EIS %# $ ' )#$ # % ( % # #* WWW DOMAIN Traffic Monitoring CACTI
Http://noc .eepis -its.edu
EEPISHOTSPOT
PROXY
LECTURER
,
EMPLOYEE
STUDENTS Internal ServerEEPIS -INFORMATION SYSTEM
(EIS http ://eis.eepis -its.edu ) Http://fileserver .eepis -its .edu E-Mail server
HTTPS , SPAM (Spamassassin ), Virus Scanner (ClamAV )
L3 Switch Block malware on physical port from inside network
+%
,
$
+%
,
$
► ►- #$
- #$
%
%
, $ . $ # % / #$ ' , $ . $ # % / #$ ' % #$ % ' % #$ % ' % , 0! -1% , 0! -122,30,30 ( ! 0( ! 0 !! '' .. $ ! # ! ( $ ! # ! ( % % ► ►
%
%
- % #$ % ' - % #$ % ' $ ' $ ' $ ' $ ' - . % % ' - . % % ' ►► 44 .. ► ► ► ► .... .. ► ►
#
#
#
#
0 % 5. ( 6! % #$ % % . 0 % 5. ( 6! % #$ % % .
( ' ( '
$ # $ . %
$ # $ . %
''
#
9
#
9
User
User
••
How many users are there?How many users are there?•
The level of the user's expertise.•
What are the users trying to do?•
Are they responsible or irresponsible?•
Who do the users know?Hardware
Hardware Software
Software
••
How many, how big and how complex?How many, how big and how complex?•
Is there a network?#
9
#
9
What
What System
System Administrator
Administrator Do
Do ?
?
Conflict
Conflict
••
ensuring that the computing system runs correctly and as efficiently as ensuring that the computing system runs correctly and as efficiently as possible, andpossible, and
•
ensuring that all users can and do use the computing system to carry out their required work in the easiest and most efficient manner••
Management will wish to restrict the amount of money spent on computer Management will wish to restrict the amount of money spent on computer••
Management will wish to restrict the amount of money spent on computer Management will wish to restrict the amount of money spent on computer systems.systems.
••
The users on the other hand will always want more disk space and faster The users on the other hand will always want more disk space and faster CPUs.CPUs.
••
The System Administrator must attempt to balance these two conflicting The System Administrator must attempt to balance these two conflicting aims#
(
#
(
►
►
:
:
0
0
#
#
►
►
(
(
#
#
#
#
►
►
-
-
.
.
0
0
#
#
►
►
$ . #
$ . #
#
#
#
#
►
►
%
%
#
#
#
#
►►
%
%
#
#
#
#
► ►
► ►
►
►
0
0
#
#
$
$
►
►
0
0
$
$
►
+%
#
#
+%
#
#
►
►
$
$
##
##
!
!
# # % ( $ #' % # % # # % ( $ #' % # % % ( $ % # ; 4 % ( $ % # ; 4 $ # % $ $ . # '
$ # % $ $ . # '
►
►
%
%
#
#
!
!
% # . # % % # . # % % %
% %
''
►
►
#
#
!
!
►
►
#
#
!
!
►
►
9 #
9 #
- #$
- #$
.
.
!
!
►
►
#$
#$
##
##
!
!
►
►
!!
►
►
$ #
$ #
!
!
►
►
!!
►
►
(
(
!
!
►
►
#
#
#
#
$
$
!
!
►
0
#
<
0
#
<
►
► << ## ## ►
► 19-19- ( !( ! 88 $$ $$
►
► %% :: !! 88 $$ $$
►
► 1 #1 # -- !! 88 $$ $$
►
► , #, # (( !! 88 $$ $$
►
► !! == %% ((
►
► 11 !! 88 $$ $$
►
► 11 !! 88 $$ $$
►
► ++ (( !! 88 $$ $$ ►
► 00 ( !( ! 88 $$ $$ ►
► ( !( ! 88 $$ $$ ►
► >> !! 88 $$ $$
►
► 00 ## !! 88 $$ $$
►
► 44 $ ? ,$ ? , ( ( ►
► ++ %% ! ! 88 $$ $$
►